3.Select New Rule in the right menu.

4.In the wizard Rule Type dialog box, select Custom. Click Next.

5.In the Endpoints dialog box, enter the IP addresses. Click Next.

6.In the Requirements dialog box, select Require inbound and outbound. Click Next.

7.In the Authentication Method dialog box, configure the IKE authentication method.

To use certificates for IKE authentication, select Computer Certificate and enter the distinguished name for the CA in the CA Name field.

To use preshared keys, select Advanced and click the Customize button. In the Customize Advanced Authentication Methods dialog box, select Preshared Key and enter an ASCII string in the Key field.

Click Next.

8.The Profile dialog box specifies when the rule will be active according to the network status of the system. Select the profiles appropriate for your topology. HP selected all the profiles.

Click Next.

9.In the Name dialog box, enter a name for the rule. Click Finish.

Using the netsh advfirewall consec command to configure connection security rules

To configure a connection security rule with specific ports or protocols, you must use the Microsoft netsh advfirewall consec command. The netsh command has a built-in help utility that you can use to display syntax information.

In most cases, you can use syntax similar to the following:

netsh advfirewall consec add rule name=rule_name enable=yes endpoint1=ip_addr endpoint2=ip_addr [protocol=protocol][port1=port] [port2=port] action=requireinrequireout auth1=computerpsk auth1psk=my_preshared_key

For example, the following command configures a rule that applies IPsec security for the telnet (port

514) service on the Windows 2008 server (10.0.0.208) from the HP-UX system (10.0.0.11):

netsh advfirewall consec add rule name=iop-rule enable=yes endpoint1=10.0.0.208 endpoint2=10.0.0.11 protocol=tcp port1=514 action=requireinrequireout auth1=computerpsk auth1psk=MyKey

Rules configured using the netsh advfirewall consec command are bidirectional. IPsec will be used for TCP packets from 10.0.0.11 to port 514 on 10.0.0.208 and for packets in the reverse direction.

The default IPsec transform is ESP with AES-128 encryption and SHA-1 authentication. To specify a different transform, use the qmsecmethods option.

5